DEV Community

Cover image for A Hypothetical Case of a Phishing Attack

A Hypothetical Case of a Phishing Attack

Evan on November 24, 2018

Let’s say, hypothetically, that we receive an email from an old university address that looks like this: Looks πŸ‘Œlegit.πŸ‘Œ It came from a .edu ema...
Collapse
 
ben profile image
Ben Halpern

Absolutely loving your posts!

Just wanna check in to let you know we’re actively working on the stuff you outlined in the recent DEV UX post. 😊

Kind of just felt like re-iterating that out of appreciation for the knowledge-share you’ve been providing.

Collapse
 
flaque profile image
Evan

Thanks so much Ben! :)

And awesome! If I get a chance I'd like to try and help! Though at the moment I'm so swamped from other duties πŸ˜…

Collapse
 
drbearhands profile image
DrBearhands

Friend of mine did this on two phishing attempts. Both times it turned out to be a pentest.

Maybe you could even delete any data they might have successfully phished:

  • Send them Mr. DROP TABLES's credentials.
  • Scan for open ports. Sometimes databases are not well protected.
Collapse
 
ondrejs profile image
Ondrej

Here I think about the importance of 2FA on every important account in the first place. It does not solve everything, but it is another (important) layer of protection. Clever phishing attacks are incredibly hard to detect. Nice article, Evan!

Collapse
 
bauripalash profile image
Palash Bauri πŸ‘»

My New Hobby : Trolling Phishers 😎

Collapse
 
larsklopstra profile image
Lars Klopstra ⚑

Is this the correct way to handle the situation? Maybe... 😝

Collapse
 
dimensi0n profile image
Erwan ROUSSEL

So funny